Analysis
-
max time kernel
157s -
max time network
210s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-12-2024 06:54
Behavioral task
behavioral1
Sample
InfectedStealer.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Level 1 Deadcode.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
SimpleObfuscator.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
InfectedStealer.exe
-
Size
4.3MB
-
MD5
3af4ffcfa2426836921b002f88c01b26
-
SHA1
9597bd7e519ef238c72416bd4d4945dc6fa1e05b
-
SHA256
d468d59ea330e48277fa1dd62eccb8d05b324eacb78b8bd1e54df0c9fb83d8f9
-
SHA512
6ebccd91ef6af4ff8b896a45a3c16aa28a8e8fb737a598e856441b6c9e59f8c6aa4af05d3abea279566b8a1196d1f05cac25661b78f3c50cde981790c8bf0a29
-
SSDEEP
98304:PkjozJ9/im8XVBKl6tmJVPS47x/EaR5zNNHtFWIT4bNJFY3OqttIFe:XzJpjS346tmJ1xsG53tFWjBHYdIw
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 8 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/4920-5-0x00000000063F0000-0x0000000006410000-memory.dmp agile_net behavioral1/memory/4920-7-0x000000000A990000-0x000000000A9B0000-memory.dmp agile_net behavioral1/memory/4920-12-0x000000000B8F0000-0x000000000B900000-memory.dmp agile_net behavioral1/memory/4920-11-0x000000000B880000-0x000000000B8DA000-memory.dmp agile_net behavioral1/memory/4920-10-0x000000000B860000-0x000000000B86E000-memory.dmp agile_net behavioral1/memory/4920-9-0x000000000B7F0000-0x000000000B85E000-memory.dmp agile_net behavioral1/memory/4920-13-0x000000000B900000-0x000000000B91E000-memory.dmp agile_net behavioral1/memory/4920-14-0x000000000C610000-0x000000000C75A000-memory.dmp agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 5 pastebin.com 6 pastebin.com 7 pastebin.com 10 pastebin.com 11 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InfectedStealer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS InfectedStealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer InfectedStealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion InfectedStealer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe 4920 InfectedStealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4920 InfectedStealer.exe